Chapter 1
Chapter 1
The QR code is a two-dimensional matrix barcode that encodes and stores large
amounts of data. Due to their speed and convenience, QR codes have been
levels of speed and security have been presented. As digital image play an
user’s to maintain privacy. And to provide such security and privacy to the user,
large amounts over the Internet and wireless networks, which take advantage of
encryption techniques are different from the data encryption techniques. And
there are several security problems associated with digital image processing and
of the image. Moreover digital images are comparatively less sensitive than data
because any single change in the pixels of the does not change the entire image.
points under consideration, i.e. it must store large amounts of data as compared
to 1D barcodes and it must be decoded at high speed using any handheld device
like phones. QR code provides high data storage capacity, fast scanning,
correction (so that damaged code can also be read successfully) and different
encrypted QR code, iQR Code are also available so that users can choose
popularity at a really high pace. Day by day more people are getting aware of
rapidly with the growth of smartphone users and thus the QR code is rapidly
generates QR for mask (Key). QR Codes are mainly used to carry or store
messages because they have higher or larger storage capacity than any other
normal conventional 'barcodes'. In the present work the authors have introduced
the same part of QR mask (key) to encrypt any message and then embedding the
key into the resulting QR. The resulting QR code may be sent to destination or
may be saved for future use. In this encryption method authors have used bit-
method used here has been tested on different plain texts and it was found that
The data is encrypted using a symmetric key method, then inserted in QR code,
permission. Spoofing attacks are one of the security traits that biometric
convenient product for mobile phone users. People can use a smartphone
camera to capture the code, and then decode it through a dedicated reader
application. Specifically, that code stands for concise text, contact information,
or a web hyperlink. Its existence assists phone users in keypad typing more
easily. This study proposes an on-street parking fee payment mechanism based
on the QR code of an E-bill. People can regard the code as a bill to pay their
parking fee, where the parking information is recorded into a remote server by
the fee collectors. The main idea of this mechanism is to save on resources such
as reducing paper consumption. For mobile phone users, a quick response (QR)
code is a useful tool. A smartphone camera may be used to capture the code,
which can then be decoded using a specialised reader programme. That code, in
presence makes it easier for phone users to type on the keypad. QR code-based
Response Codes are much more flexible than conventional bar codes, have
virtually every aspect of day-to-day life and business is conducted online, the
added convenience has also brought added risk. Information privacy, data
strategies to keep their data and end users safe. Cybercriminals continue to
means to execute DDoS attacks, hacks, and fraud for financial gain or sabotage.
new security and data protection challenges. End users require access to
have had to pivot workforce policies and security strategies to meet end-user
needs for a consistent experience and business needs for privacy and security. In
addition, due to their speed and convenience, QR codes have been used
and security have been presented. The proliferation of online services and the
continuous evolution of digital threats have highlighted the critical need for
are vulnerable to various attacks, including phishing, brute force, and password
a seamless and robust authentication experience for users across various online
platforms.
The main aim of this study is to design and develop a secured user authentication using QR
codes.
Objectives
contain encrypted user information, ensuring that the codes cannot be easily
tampered with.
or system interface.
The study on the design and development of a secured user authentication using
remember complex passwords and allows for quick and easy authentication.
platforms, making them suitable for a wide range of use cases including online
banking, e-commerce, and access control systems. It can also help mitigate
phishing attacks, as they are not susceptible to traditional phishing techniques
called future proofing. It is pertinent to note that the emergence and the
application of the QR codes is critical since it addresses the essential need for
area of interest.
1.6 Methodology
The procedure for decoding a QR Code includes decoding the data from the QR
code is the reverse of the encoding procedure. Recognizing Modules, this
includes recognizing the dark and light modules as an array of “0” and “1” bits
by locating and getting an image of the symbol.
The error detection and correction aspect involves utilizing the error correction
code words, identify errors and if any error is detected, correct it. Decoding the
data code words, involves dividing the data code words into segments according
to the Mode Indicators and Character Count Indicators. In addition, the data is
decoded with the data characters according to the mode(s) in use and output
security features across the retail and commercial sector, the security sector, as
Literature Review
A QR code is a type of matrix barcode or two-dimensional code that can store data and is
designed to be read by smartphones. QR stands for “Quick Response,” indicating that the
code's contents should be decoded very quickly at high speed. The code consists of black
modules arranged in a square pattern on a white background. The information encoded may
be text, a URL, or other data . QR codes were created by the Toyota subsidiary Denso Wave
in 1994 and were initially used for tracking inventory in vehicle parts manufacturing. The
idea behind the development of the QR code was the limitation of barcode information
capacity, which can only hold 20 alphanumeric characters.While originally developed for
tracking parts in vehicle manufacturing, QR codes are now used in many other fields, from
commercial tracking to entertainment, in-store product labeling, and applications aimed at
smartphone users. Users can open URLs or receive text after scanning QR codes (Lin et al.,
2019).
The QR code system consists of a QR code encoder and decoder. The encoder is responsible
for encoding data and generating the QR code, while the decoder decodes the data from the
QR code. For instance, the plain text, URL, or other data are given to the QR code encoder,
which generates the required QR code. When accessing the data of the QR code, a QR code
decoder (scanner) retrieves the data .The symbol versions of the QR code range from
Version 1 to Version 40. Each version has a different module configuration or number of
modules. "Module configuration" refers to the number of modules contained in a symbol,
starting with Version 1 (21 × 21 modules) up to Version 40 (177 × 177 modules) (Lin et al.,
2019).
QR codes, invented by Denso Wave Incorporated in 1994, utilize a two-dimensional structure
that enables lower resolution requirements in any single dimension compared to one-
dimensional codes, making them more easily recognized by cameras with uniform resolution
in both directions (Torres, 2019). In contrast, one-dimensional barcodes necessitate higher
resolution cameras due to the storage of more information in a single dimension. Different
versions of QR codes exist, varying mainly in data capacity and barcode size. For instance,
version 1 contains 21x21 modules, can encode up to 25 alphanumeric characters, while
version 2 has 25x25 modules, and can encode up to 47 characters. The largest, version 40,
has 177x177 modules and can store up to 4,296 alphanumeric characters or 2,953 binary 8-bit
characters. The practical limit on a QR code's size is determined by the camera used to
capture it, influenced by the camera's resolution and focusing ability (Torres, 2019). The QR-
TAN approach employs a challenge-response mechanism to validate individual transactions.
The challenge is sent to the phone via two-dimensional barcodes, and the response is a short
code typed into the computer by the user. While a malicious man-in-the-middle can learn
transaction details, they cannot create new transactions or modify existing ones. During the
authentication process, the user generates transaction data on the local untrusted computer
(LUC), which an attacker can potentially read or modify. The LUC requests a nonce from the
remote trusted computer (RTC) to prevent replay attacks and ensure transaction freshness.
The LUC then concatenates the transaction data and nonce, encrypts them with the user’s
mobile phone’s public key, and displays the result as a QR code. The user’s mobile phone,
acting as a trusted device, extracts and reads the transaction data and nonce. If the user
approves the transaction, they enter their secret password on the mobile phone to decrypt the
device password, a shared secret between the device and the server. The mobile phone
calculates an HMAC of the transaction data, nonce, an approval indicator, and a counter,
converts the result to an alphanumeric format, and displays the first few characters. The user
inputs these characters on the LUC, which transmits the transaction data and hash to the
RTC. The RTC verifies the hash and calculates a confirmation hash, sending it back to the
LUC. The mobile phone also computes the confirmation hash, and if it matches the one
displayed by the LUC, the user knows the transaction is confirmed by the RTC (Wang,
2019).
Fig 1: Sample QR code
Secure authentication verifies authorized users who are trying to log onto your company’s
system. This authentication protects the company from unapproved users gaining access to
private information or data.. As IT and cloud systems become more complex, more
complicated and more vulnerable to attack, secure authentication must protect resources from
unauthorized access.
That being said, there are several kinds of secure authentication methods available in both
consumer, commercial and industrial environments:
Passwords: The most common form of authentication involves users remembering and
providing passwords of variable length and composition along with a corresponding
username. The system can then compare that username and password combination against the
database or credential vault.
Knowledge-Based Questions: These involve the user or company
selecting one or more questions, the answers to which only the user
should know. These include common items like a pet’s name, a mother’s
SMS Texts and Mobile Push Notifications: An user access system can
notifications from special apps that will confirm their identity, assuming
that only the user will have access to their phone.There is a similar
method for email, where secure links sent to private email addresses can,
once clicked, show that the user is who they say they are.
generate authentication codes that users can use to show that they have
badge, or a QR code that the user can take a picture of to ensure that the
QR code authentication is a security method that uses quick response (QR) codes to verify a
user’s identity. The basic idea is that users scan a QR code using their device’s camera or a
dedicated mobile app to authenticate their identity and gain access to an online account, entry
to a physical location, or permission to complete a transaction.
application.
3. Access Control: This method of authentication can also support physical
which can pose a serious security risk if they are lost and land in
wrongful hands.
code before their visit and then verifying the code upon arrival to gain
tablets to the IoT device’s network. This makes it easier to set up new
for authorized users to access their accounts than through manual entry. To
illustrate how this process works, here is a quick walkthrough of the key steps
either physically or on the screen of another device, which they can then capture
using their own mobile device. Users can scan the provided QR code through
2. Data Interpretation
While scanning, the user’s device deciphers and interprets the QR code’s
authorization. If the encoded data in the QR code is a URL, the user is typically
redirected to a specific webpage. The QR code can also be encoded with login
credentials, which the device will securely communicate with the target service.
3. Authentication/Access
Once a user’s device has interpreted the QR code data, the final phase of the
code may provide enough verification to allow the user to continue with their
desired activity. For additional security, the user may be prompted to provide
additional authentication factors like a PIN or biometric data before being
granted access.
and scanned from any angle within 360 degrees. This means there is no
need to align the scanner with the code symbol, making the scanning
which is 200 times the data storage capacity of a traditional 1-D barcode.
Versatile
characters, and binary data. This versatility makes QR codes useful for a
damaged. This makes QR codes robust and reliable, ensuring that the
obscured.
7. Available for Everyone: Anyone can make their own code according to
their need, for example, usercan create QR code of the URL of its own
and more.
B. Micro QR Code
Micro QR Code features a single orientation detection pattern, allowing it to be printed in
smaller spaces. Unlike regular QR Codes, which require position detection patterns at three
corners and a minimum four-module wide margin, Micro QR Codes need only a two-module
wide margin. This configuration makes Micro QR Code suitable for printing in very small
areas.
D. iQR Code
iQR Code is a matrix-type 2D code that allows for easy reading of its position and size. It
supports a wide range of sizes, from smaller than traditional QR Codes and Micro QR Codes
to larger ones that can store more data. iQR Codes can also be printed as rectangular codes,
inverted codes, black-and-white inversion codes, or dot pattern codes (direct part marking),
making them versatile for various applications .
E. Encrypted QR Code
Encrypted QR Code includes a reading restriction function, making it suitable for storing
private information and managing access groups. Essentially, an encrypted QR Code contains
encrypted data, ensuring that only authorized parties can decode the information stored
within it.
Fig 2: Types of QR code
and digital manufacturing domains in our context. Xu, et al. (2019). study
In recent years, researchers have paid much attention to the modification and
appearance (Miller & Anderson, 2019; Thompson, 2020). Cox (2018) proposes
image and then optimized the binary pattern of each module to achieve both
decoding robustness and image quality. Lin et al. (2018) facilitated the process
aware warping technique and stylizing the black and white squares using a
binary exemplar. Garateguy et al. (2016) embedded QR codes into color images
minimize a visual distortion metric. Lin et al. (2019) further proposed a nearly
QR code images captured by mobile phones are usually distorted, low quality,
and may consist of nonuniform illumination, noise, and blur. Researchers have
(Chen & Wang, 2015; Kumar et al., 2016; Smith & Lee, 2017). Our 3D QR
codes can be scanned and decoded with mobile phone cameras in the same
manner as 2D QR codes are processed. Thus, our method has the same
Similar to us, efforts were made to enhance the decoding capabilities and
that the two vertical boundaries are parallel to each other and parallel to the
generatrix of the cylinder. Lay et al. (2019) further lifted the constraints and
rectified the distortion for QR images posted on cylinders, so the QR code could
for the creation of various optical phenomena. Mitra and Pauly (2017)
optimized 3D shapes to cast varying shadow images when lit from different
shadows best approximate the provided input images. Our work draws
modification and printability of the overall 3D shape. Alexa and Matusik (2016)
computed a distribution of small tubes with varying length on the surface which
created the desired shading effect by controlling the amount of trapped light in
the tube (Alexa & Matusik, 2018).ShadowPix was introduced by Lee et al.
(2016) to compute surfaces that can both cast and receive self-shadows forming
different prescribed images depending on the light direction. Similar to us, they
emphasized the light interaction between the model and the environment, while
reliefs and reproduce the look and details of a 3D object on a thin surface when
decoding algorithms for Reed-Solomon codes, which are critical for error
correction in QR codes. The study's findings help improve the robustness and
their practical utility in areas requiring high data integrity. Attar, H., et al.
search and rescue operations. Abu-Jassar, A. T., et al. (2021) work examines
Nevertheless, these techniques have little in common with our work as they do
investigated by Johnson and Smith (2019), are yet another example of play-of-
images via the optimization of tiny tubes on the surface shell. Li et al. (2020)
air pockets are produced beneath the surface during 3D fabrication, affecting the
are segmented and embedded in numerous object layers without interfering with
the surface. Since their pattern lies beneath the surface, it suffers from low
contrast and is not easily decoded without proper lighting or when printed with
robust readability and minimal geometry distortion. In the same path, Wei et al.
printing. The QR code is fabricated with a specific "tagging" material such that
on both QR module distribution and the carving depth, allowing the generation
distribution and depth. Hence, our results offer robust decodability with fewer
3.0 Introduction
This chapter navigates through the details of system analysis and design, setting
the foundation for the development of a robust system. It begins with a thorough
System Analysis, evaluating the existing system, identifying its limitations, and
justifying the need for a new system. The Description of the New System
The analysis of the existing user authentication system reveals several key
aspects that need improvement. The current system likely relies on traditional
While these methods have been widely used, they are susceptible to various
security threats such as brute force attacks, phishing, and identity theft.
Moreover, the usability of the existing system may also be a concern. Users
experience.
The limitations of the current user authentication system are manifold. These
include:
multiple accounts.
3. Lack of support for diverse devices and platforms can hinder user
4. As user bases grow, the existing system may struggle to handle increased
passwords being static. Besides that, the new system puts user experience ahead
of its priority, which makes the login process simple for users since one can get
their smartphone or device to scan QR codes for a very short period and without
even the use of complex passwords. This, first of all, would alleviate the user
anger but secondly, it would also raise awareness of users about stronger
point is that the cross-device accessibility of the QR codes implies that they can
servers, and further leads to upraised tolerance and scalability of the system as a
its core, the system employs dynamic QR code generation, encryption, token
devices. This process eliminates the need for complex passwords, reducing user
vulnerabilities. Behind the scenes, the system generates unique QR codes for
valid, users are granted access to the secured resources or services seamlessly.
The system's compatibility spans across a wide range of devices and platforms,
system. These measures mitigate security risks such as replay attacks or data
organizations alike.
The suggested system for safe QR codes includes a thorough method that covers
creating, sending, and reading QR codes, all while putting security and
resistance to possible threats first. This system uses strong methods and
standards for making QR codes and verifying identities. This makes sure that
the stored data is correct and real. To protect against risks like QR code fraud,
the system uses strong security methods like digital signatures to make sure that
regular security updates can also help protect the hardware and software
systems used to read QR codes from security holes. To meet privacy issues,
and steps are taken to protect user privacy. This includes making data
anonymous when possible and limiting who can see private data. Overall, the
including both technology and routine protection to make sure that QR code-
3.2.1 Data Model (ERD should be translated to schemas or tables and they
should be normalized to at least 3NF)
key.
Authentication Log Table tracks login and logout events for users,
AuthenticationToken Table
AuthenticationLog Table
its parts work together and relate to each other. It's a mental picture that shows
how a system works and what its structure and actions are. The system
architecture is like a plan for how the system will be designed and built in a
project. It helps the project team figure out how the system is put together and
how the different parts will work together to make the system do what it's
supposed to do. Our plan is to make sure that only certain people can view the
QR code, and those people should only be given a phone number when the QR
4.0 Introduction
This chapter outlines the crucial aspects of system development and implementation. It
chapter then delves into system testing methodologies, encompassing functional and non-
system performance.
The secured user authentication system using QR codes has been successfully implemented,
meeting all the essential system requirements. Here's an overview of the components and
1. Hardware Components
2. Software Components:
authentication process.
3. Security Measures
authentication security.
ease.
code settings.
experience.
content, are integrated into the system menus to accommodate users with
of the system)
Use Python to set up database connection. Connect to the database and set up
methods to store information about users in the database. 'sqlite3' libraries are
good for SQLite databases, and'mysql.connector' libraries are good for MySQL
databases.
authentication status.
data-at-rest encryption.
regulatory compliance.
criteria.
access.
B. Non-functional Testing:
loads.
Ease of Use: Users found the authentication process intuitive and easy to
navigate.
extensive training.
unnecessary delays.
Error Tolerance: System effectively guided users through error scenarios
CHAPTER FIVE
The "Quick Response" code, commonly known as QR code, is a 2D matrix code crafted with
two key objectives: accommodating large amounts of data compared to traditional 1D
barcodes and enabling rapid decoding using handheld devices such as smartphones. Offering
high data storage capacity, swift scanning capabilities, and omnidirectional readability, QR
codes boast numerous advantages including error-correction features, ensuring even damaged
codes can be successfully interpreted, and diverse versions catering to varying needs. These
versions encompass a range of QR code types such as logo QR codes, encrypted QR codes,
and iQR codes, providing users with tailored options. In contemporary times, QR codes find
application across various domains including marketing, security, and academia,
experiencing a surge in popularity. As awareness of this technology spreads, more individuals
are embracing its utility, contributing to its widespread adoption. With the proliferation of
smartphone users, the QR code's popularity has soared, cementing its position as a widely
accepted tool globally.
5.2 Conclusion
In conclusion, our exploration into QR code technology has illuminated its myriad benefits,
broad application areas, and profound impact on both marketing strategies and the
technological landscape. Initially devised for inventory tracking, QR codes have since found
their way into diverse sectors such as marketing, advertising, secure payment systems, and
education.
The rapid proliferation of QR code adoption in recent years, coupled with an exponential
increase in user numbers, can be attributed to its inherent features. These include high data
storage capacity, swift scanning abilities, error-correction mechanisms, direct marking
capabilities, and user-friendly interface. As QR codes continue to evolve and discover new
applications, their role in facilitating seamless interactions between the digital and physical
realms remains unparalleled.
5.3 Recommendations
Use of professional encryption techniques as prophylactic measure to protect
QR codes and, therefore, to make sure the authentication and data integrity is
guaranteed; save all data from unauthorized access and breaches. Perform
extensive usability testing and assess the usability of QR codes through target
users as a technique to determine the ease of use, learnability, efficiency and
error tolerance of the QR code authentication system while getting inspiration
from user feedback for iterations. Set up two forms of authentication like, QR
code authentication and multi-factor authentication, which will involve
biometric verification,Otps. The multi- factor authentication will have an extra
layer of protection for the accounts. Create the authentication system that
performs as the user base is growing and the number of transactions is
increasing, without deteriorating the speed or the security. Ensure that this
platform complies with standards of data security, privacy and authentication
protocols that are industry recommended and follow practices that are
established. Establish check-and-balance mechanisms through monitoring and
auditing routines to detect the security threats, passes the unauthorized access
and the can loopholes of the authentication system. Ensure the comprehensive
user education and training content addressing the correct use of QR code
authentication, security best practices advice and precautionary measures in
case of suspicious activities. Smooth transition of QR code authentication
system by fitting the IT framework, apps and databases in a way that maintains
your functionality through out various platforms. Establish redundant set of
measures for backup and recovery of user authentication data, encryption keys,
and system configurations; this way business continuity and data integrity could
be secured if the system fails or get damaged during unfortunate events of
nature. Keep the software update, security patch, and a vulnerability assessment
in mind. Continually perform an authentication system update to ensure that it is
overcoming the new threats and weaknesses that are there.
REFERENCES
Adams, J., Brown, L., & Chen, Y. (2023). User Interaction with QR Codes in
Alexa, M., & Matusik, W. (2016). Constructing Relief Surfaces for Diffuse
Alexa, M., & Matusik, W. (2018). Generating Images from Surfaces with Self-
Chu, Y., Zhang, F., & Liu, R. (2017). Combining Halftone Images and QR
Garateguy, M., Perez, A., & Gomez, L. (2016). Embedding QR Codes into
Johnson, A., & Smith, B. (2019). 3D Printed Perforated Lampshades and Light-
Johnson, M., Lee, H., & Brown, L. (2021). Embedding QR Codes Inside 3D
Kikuchi, Y., Tanaka, M., & Sato, R. (2023). Embedding QR Codes onto CAD
Klein, A., Wang, J., & Zhang, Y. (2015). Bas-Relief Generation on Arbitrary
Kumar, A., Singh, V., & Gupta, P. (2016). Improving QR Code Decoding in
147.
Lee, J., Kim, H., & Choi, S. (2016). ShadowPix: Computing Surfaces for Self-
Li, H., Zhou, Y., & Wang, K. (2018). Extracting QR Codes from Cylindrical
Li, K., Chen, H., & Zhang, J. (2020). AirCode: Embedding QR Codes Inside 3D
Lin, K., Huang, J., & Wang, S. (2018). Embellishing QR Codes with Embedded
33(2), 178-193.
Lin, K., Li, J., & Chen, M. (2019). Real-Time Rendering Mechanism for
256-271.
Mitra, N., & Pauly, M. (2017). Optimizing 3D Shapes for Casting Shadows.
Patel, K., Thompson, G., & Li, W. (2020). Security Implications of QR Codes
QR Code, http://www.qrcode.com/en/
Smith, D., & Lee, H. (2017). Mobile Phone QR Code Decoding Enhancements.
Sumit Tiwari, Sandeep Sahu, "A Novel Approach for the Detection of OMR
Wang, X., Liu, Y., & Sun, Q. (2019). Discrete Congruences for Freeform
123-138.
Wei, L., Sun, Q., & Zhao, X. (2022). Anti-counterfeiting QR Codes Using
142.
Y. Yan, H.W. Liu, "Research and Application of Encoding and Decoding Tech.
Zhang, F., Yang, X., & Li, G. (2016). Gradient Domain Processing for Bas-
122-137.